[611] in bugtraq

home help back first fref pref prev next nref lref last post

X Window System security

daemon@ATHENA.MIT.EDU (Stephen Gildea)
Wed Jan 11 13:25:46 1995

To: bugtraq@fc.net
Cc: bf@morgan.com (Benjamin Fried), ddk@beta.lanl.gov, e41126@rl.gov,
        Jjd@bbn.com
In-Reply-To: Message from bf@morgan.com of 10 Jan 95 13:10:45 EST
	<9501101810.AA08507@rs1.fid.morgan.com> 
Date: Wed, 11 Jan 1995 11:13:48 EST
From: Stephen Gildea <gildea@x.org>

There are already good tools for setting up keys and passing them
around.  xdm sets up keys.  xrsh passes them to remote clients.

Host-based authorization isn't the only revokable access method.
Anything that has principals, rather than passwords, has this
advantage.  In X11R6 there are two such schemes, MIT-KERBEROS-5 and
SUN-DES-1.  (SUN-DES-1 was also in R5.)  So while you can't take an
MIT-MAGIC-COOKIE away from someone, you can deny KRB:gildea@x.org
further connection rights.  See the Xsecurity(1) manual page for
details.

Note that none of these methods allow you to revoke the authorization
of an already-connected client.

 < Stephen
   X Consortium

home help back first fref pref prev next nref lref last post